Application security, Security
December 4, 2023
Via: Help Net SecurityArmorCode announced it closed a pre-emptive $40 million Series B round to advance its mission of helping companies ship secure software fast and at scale. Premier venture firm HighlandX led the round, joined by NGP Capital, along with participation from […]
November 30, 2023
Via: The RegisterA US congressional committee has questioned whether Chinese-made Light Detection and Ranging (LiDAR) devices might have a negative impact on national security, and suggested they may therefore be worthy of the same bans that prevent stateside adoption of other tech. […]
Application security, Security
November 29, 2023
Via: The RegisterReading Borough Council has securely restored its planning portal after facing criticism for recommending questionable tech security practices to users. Before the fixed version went live this morning, the English local authority’s online planning application portal had been offline due […]
Application security, Security
November 28, 2023
Via: The RegisterAthena AI, the new generative AI layer that spans across the entire Varonis Data Security Platform, redefines how security teams protect data – from visibility to action. Using natural language, customers can conduct in-depth investigations and analysis more efficiently, transforming […]
November 28, 2023
Via: The RegisterA Plex “feature” has infuriated some users after sharing with others what they are watching on the streaming service — and it appears this functionality is on by default. At the start of this month Plex rolled out something called […]
Application security, Security
November 28, 2023
Via: SecureWorldIn the ever-evolving landscape of computer security, many innovations flood the market, each boasting its efficacy. As a regular attendee of security conferences and contributor to security books, it’s evident to me that the field remains a hot topic. However, […]
November 27, 2023
Via: Help Net SecurityAWS Kill Switch is an open-source incident response tool for quickly locking down AWS accounts and IAM roles during a security incident. The solution includes a Lambda function and proof of concept client. You can either adopt this client or […]
Application security, Security
November 27, 2023
Via: Help Net SecurityOpenSSL is a full-featured toolkit for general-purpose cryptography and secure communication. The final version of OpenSSL 3.2.0 is now available. Major changes in OpenSSL 3.2.0 This release incorporates the following potentially significant or incompatible changes: The default SSL/TLS security level […]
November 27, 2023
Via: Help Net SecurityTrellix announced its generative artificial intelligence (GenAI) capabilities, built on Amazon Bedrock and supported by Trellix Advanced Research Center. Amazon Bedrock is a fully managed service from AWS making foundation models (FMs) from leading AI companies accessible via an API […]
November 22, 2023
Via: The RegisterMicrosoft’s bug bounty program celebrated its tenth birthday this year, and has paid out $63 million to security researchers in that first decade – with $60 million awarded to bug hunters in the past five years alone, according to Redmond. […]
November 21, 2023
Via: Naked SecurityAs the online shopping season ramps up in many parts of the world, these ten top tips will help you maintain your privacy and safety so you can shop with confidence. Use an ad blocker – Advertisements are not only […]
November 20, 2023
Via: The RegisterIt’s that time of year again – NordPass has released its annual list of the most common passwords. And while it seems some of you took last year’s chiding to heart, most of you arguably swapped bad for worse. Password […]
Application security, Security
November 20, 2023
Via: Naked SecurityWith Sophos XDR (Extended Detection and Response), Sophos Endpoint customers can extend their defenses against sophisticated human-led attacks. It gives you the tools to detect and respond to suspicious activity on your Sophos-protected endpoints and your wider environment before active […]
Application security, Security
November 16, 2023
Via: SecureWorldIn a significant move to harness the power of artificial intelligence (AI) for enhanced cybersecurity, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has unveiled its “2023-2024 CISA Roadmap for Artificial Intelligence.” The comprehensive plan, released this month, outlines CISA’s […]
November 15, 2023
Via: The RegisterNovel weaknesses in Google Workspace have been exposed by researchers, with exploits potentially leading to ransomware attacks, data exfiltration, and password decryption. Researchers at Bitdefender say the methods could also be used to access Google Cloud Platform (GCP) with custom […]
November 14, 2023
Via: The RegisterThe UK’s National Cyber Security Centre (NCSC) has once again sounded its concern over the rising threat level to the nation’s critical national infrastructure (CNI). In its annual review published at midnight Monday, it admitted that the level of cybersecurity […]
November 8, 2023
Via: The RegisterDaily incursions are underway with the aim of removing every bit of data that you’ve got – the cyber criminals’ aim is to break in and get out again laden with digital booty. But without that data exfiltration there’s no […]
November 7, 2023
Via: The RegisterAmerica’s immigration cops have pushed back against an official probe that concluded their lax mobile device security potentially put sensitive government information at risk of being stolen by foreign snoops. Between April 27 and August 17, the US Department of […]
November 7, 2023
Via: The RegisterThe UK government has set in train plans to introduce legislation requiring tech companies to let it know when they plan to introduce new security technologies and could potentially force them to disable when required. The measures were announced just […]
November 6, 2023
Via: The RegisterOrganisations in multiple industries often face risks which can severely impact their operational resilience. Cyber criminals like to use ransomware and vulnerable third-party connections to hijack operational technology (OT) systems which can stop production in manufacturing environments, for example. These […]